Towards Dynamic Execution Environment for System Security Protection against Hardware Flaws

被引:0
|
作者
Schmitz, Kenneth [2 ]
Keszocze, Oliver [1 ,2 ]
Schmidt, Jurij [1 ,2 ]
Grosse, Daniel [1 ,2 ]
Drechsler, Rolf [1 ,2 ]
机构
[1] Univ Bremen, Inst Comp Sci, D-28359 Bremen, Germany
[2] DFKI GmbH, Cyber Phys Syst, D-28359 Bremen, Germany
关键词
D O I
10.1109/ISVLSI.2018.00107
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attacks exploiting security flaws in software are very common. They are typically addressed during the ongoing software development process or by providing software patches. Attacks making use of hardware related flaws via malicious software recently gained popularity. Prominent examples are errata based, aging-related or, for example, the infamous Rowhammer-attack. In this paper, we present an approach to detect software based attacks which exploit hardware flaws. Since the flaws are typically triggered by characteristic instruction sequences, our approach is implemented as a dynamic execution environment for program monitoring at runtime. Several case studies underline the effectiveness and the low overhead of our approach.
引用
收藏
页码:557 / 562
页数:6
相关论文
共 50 条
  • [1] SAFER PATH: Security Architecture using Fragmented Execution and Replication for Protection Against Trojaned Hardware
    Beaumont, Mark
    Hopkins, Bradley
    Newby, Tristan
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1000 - 1005
  • [2] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Kaur, Shaminder
    Singh, Balwinder
    Kaur, Harsimranjit
    SILICON, 2022, 14 (05) : 2421 - 2427
  • [3] Silicon Based Security for Protection Against Hardware Vulnerabilities
    Shaminder Kaur
    Balwinder Singh
    Harsimranjit Kaur
    Silicon, 2022, 14 : 2421 - 2427
  • [4] Hardware-Assisted System for Program Execution Security of SOC
    Wang, Xiang
    Pang, Shu-Song
    Wang, Wei-Ke
    Zhao, Zong-Min
    Zhou, Cheng
    He, Zhan-Hong
    Ang, Xiao-Cui
    Xu, Yang
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [5] Dynamic Function Verification for System on Chip Security Against Hardware-Based Attacks
    Kim, Lok-Won
    Villasenor, John D.
    IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (04) : 1229 - 1242
  • [6] Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution
    Bhunia, Swarup
    Abramovici, Miron
    Agrawal, Dakshi
    Bradley, Paul
    Hsiao, Michael S.
    Plusquellic, Jim
    Tehranipoor, Mohammad
    IEEE DESIGN & TEST, 2013, 30 (03) : 6 - 17
  • [7] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453
  • [8] IC security and quality improvement by protection of chip backside against hardware attacks
    Amini, E.
    Beyreuther, A.
    Herfurth, N.
    Steigert, A.
    Muydinov, R.
    Szyszka, B.
    Boit, C.
    MICROELECTRONICS RELIABILITY, 2018, 88-90 : 22 - 25
  • [9] Security Feature Measurement for Frequent Dynamic Execution Paths in Software System
    Wang, Qian
    Ren, Jiadong
    Yang, Xiaoli
    Cheng, Yongqiang
    Davis, Darryl N.
    Hu, Changzhen
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [10] Towards an Automated Security Awareness System in a Virtualized Environment
    Labuschagne, William Aubrey
    Eloff, Mariki
    PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 163 - 171